// For flags

CVE-2024-38353

CodiMD - Missing Image Access Controls and Unauthorized Image Access

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.

CodiMD permite notas de markdown colaborativas en tiempo real en todas las plataformas. A CodiMD anterior a 2.5.4 le falta una vulnerabilidad de autenticación y control de acceso que permite a un atacante no autenticado obtener acceso no autorizado a los datos de imágenes cargados en CodiMD. CodiMD no requiere una autenticación válida para acceder a las imágenes cargadas o para cargar nuevos datos de imágenes. Un atacante que pueda determinar la URL de una imagen cargada puede obtener acceso no autorizado a los datos de la imagen cargada. Debido a la generación insegura de nombres de archivos aleatorios en la librería Formidable subyacente, un atacante puede determinar los nombres de archivos de imágenes cargadas previamente y aumenta la probabilidad de que este problema sea explotado. Esta vulnerabilidad se solucionó en 2.5.4.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-14 CVE Reserved
  • 2024-07-10 CVE Published
  • 2024-07-11 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
  • CWE-862: Missing Authorization
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hackmdio
Search vendor "Hackmdio"
Codimd
Search vendor "Hackmdio" for product "Codimd"
< 2.5.4
Search vendor "Hackmdio" for product "Codimd" and version " < 2.5.4"
en
Affected